CISA: CISA Releases Four Industrial Control Systems Advisories
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on November 28, 2023. These...
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on November 28, 2023. These...
CISA Releases First Secure by Design Alert Today, CISA published guidance on How Software Manufacturers Can Shield Web Management Interfaces...
Exploitation of Unitronics PLCs used in Water and Wastewater Systems CISA is responding to active exploitation(link is external) of Unitronics...
Apple Releases Security Updates for Multiple Products Apple has released security updates to address vulnerabilities within Safari, macOS Sonoma, iOS,...
Multiple Vulnerabilities Affecting Web-Based Court Case and Document Management Systems CISA has assisted a researcher with coordinating the disclosure of...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Removes One Known Exploited Vulnerability From Catalog CISA is continually collaborating with partners across government and the private sector....
CISA and Partners Release Joint Advisory on IRGC-Affiliated Cyber Actors Exploiting PLCs Today, CISA, the Federal Bureau of Investigation (FBI),...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________SimpleSAMLphp xml-security security bypassPlatforms Affected:SimpleSAMLphp xml-security 5.0.0-alpha.12 SimpleSAMLphp xml-security 1.6.11Risk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________SimpleSAMLphp xml-security could allow a remote attacker to...
NAME__________Perl code executionPlatforms Affected:Perl Perl 5.34.0 Perl Perl 5.36.0 Perl Perl 5.38.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Perl could allow a local authenticated...
NAME__________Yokogawa STARDOM denial of servicePlatforms Affected:Yokogawa STARDOM FCN/FCJ R1.01 Yokogawa STARDOM FCN/FCJ R4.31Risk Level:5.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Yokogawa STARDOM is vulnerable...
NAME__________Pimcore Customer Management Framework cross-site request forgeryPlatforms Affected:Pimcore Customer Management Framework 4.0.4Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Pimcore Customer Management Framework is vulnerable...
NAME__________Perl buffer overflowPlatforms Affected:Perl Perl 5.34.0 Perl Perl 5.36.0 Perl Perl 5.38.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Perl is vulnerable to a heap-based...
NAME__________Sentry Symbolicator server-side request forgeryPlatforms Affected:Sentry Symbolicator 0.3.3 Sentry Symbolicator 23.11.1Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Sentry Symbolicator is vulnerable to server-side request...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets could allow...
NAME__________Catalis CMS360 information disclosurePlatforms Affected:Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Catalis CMS360 could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Henschen & Associates court document management software information disclosurePlatforms Affected:Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Henschen & Associates court document management software could...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets are vulnerable...
NAME__________Schweitzer Engineering Laboratories SEL-411L information disclosurePlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L could allow a remote...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets could allow...
NAME__________Schweitzer Engineering Laboratories SEL-411L clickjackingPlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L could allow a remote attacker...
NAME__________Schweitzer Engineering Laboratories SEL-411L cross-site scriptingPlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L is vulnerable to cross-site...